Thanks for your help, everything works now.
With regards
Ivica Glavocic
On Thu, Nov 28, 2024 at 3:12 PM Viktor Dukhovni via Postfix-users
wrote:
>
> On Thu, Nov 28, 2024 at 03:02:36PM +0100, Ivica Glavočić via Postfix-users
> wrote:
>
> > I wanted to enable SSL/TLS implicit encryption on port
natan via Postfix-users:
> Hi
> I have some problem with comunications postfix + python
>
> in main.cf:
> ...
> smtpd_restriction_classes=testowy
> testowy=check_policy_service { unix:private/testowy, timeout=4s,
> default_action=DUNNO }
>
> smtpd_recipient_restrictions =
> check_recipi
Hi
I'm trying to write something like DMARC in Python to reject if the from
and return-path for the selected domain are different
Because these similar solutions like vrfydmn (in Perl) are not very
user-friendly
W dniu 28.11.2024 o 13:57, natan via Postfix-users pisze:
Hi
I have some proble
On Thu, Nov 28, 2024 at 01:57:57PM +0100, natan via Postfix-users wrote:
> print("DUNNO") # REJECT, PERMIT, DUNNO
You did not read the docs carefully, the output should be:
action=DUNNO\n\n
> Nov 28 13:54:15 mx postfix/smtpd[2953675]: warning: missing attribute action
> in input fr
Hi
Problem solved:
.
recipient = inputs.get("recipient", "")
if recipient.endswith("@testdomain.ltd"):
sys.stdout.write("action=REJECT\nreject_reason=554 5.7.1
Access denied\n\n")
else:
sys.stdout.write("action=DUNNO\n\n")
sys.stdout.
On Thu, Nov 28, 2024 at 03:02:36PM +0100, Ivica Glavočić via Postfix-users
wrote:
> I wanted to enable SSL/TLS implicit encryption on port 465, in order
> to do that, I added option smtpd_tls_wrappermode = yes in main.cf
> config file, it worked.
No, it did not "work", because in main.cf it affe
Hi
I wanted to enable SSL/TLS implicit encryption on port 465, in order
to do that, I added option smtpd_tls_wrappermode = yes in main.cf
config file, it worked.
After that option was enabled, ip relay trough port 25 with no
authentication or encryption stopped working, TLS became obligatory
for p
Hi
I have some problem with comunications postfix + python
in main.cf:
...
smtpd_restriction_classes=testowy
testowy=check_policy_service { unix:private/testowy, timeout=4s,
default_action=DUNNO }
smtpd_recipient_restrictions =
check_recipient_access inline:{{testdomain.ltd=testowy}},